Eric Nunes

According to our database1, Eric Nunes authored at least 15 papers between 2015 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2020
A Logic Programming Approach to Predict Enterprise-Targeted Cyberattacks.
Proceedings of the Data Science in Cybersecurity and Cyberthreat Intelligence, 2020

Sunrise to Sunset: Analyzing the End-to-end Life Cycle and Effectiveness of Phishing Attacks at Scale.
Proceedings of the 29th USENIX Security Symposium, 2020

2018
Reasoning about Cyber Threat Actors.
PhD thesis, 2018

Predicting Hacker Adoption on Darkweb Forums Using Sequential Rule Mining.
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2018

DARKMENTION: A Deployed System to Predict Enterprise-Targeted External Cyberattacks.
Proceedings of the 2018 IEEE International Conference on Intelligence and Security Informatics, 2018

Community Finding of Malware and Exploit Vendors on Darkweb Marketplaces.
Proceedings of the 1st International Conference on Data Intelligence and Security, 2018

At-risk system identification via analysis of discussions on the darkweb.
Proceedings of the 2018 APWG Symposium on Electronic Crime Research, 2018

2017
Measuring cyber attribution in games.
Proceedings of the 2017 APWG Symposium on Electronic Crime Research, 2017

Proactive identification of exploits in the wild through vulnerability mentions online.
Proceedings of the 2017 International Conference on Cyber Conflict, 2017

2016
Darknet and deepnet mining for proactive cybersecurity threat intelligence.
Proceedings of the IEEE Conference on Intelligence and Security Informatics, 2016

Argumentation models for cyber attribution.
Proceedings of the 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2016

Toward Argumentation-Based Cyber Attribution.
Proceedings of the Artificial Intelligence for Cyber Security, 2016

Cyber-Deception and Attribution in Capture-the-Flag Exercises.
Proceedings of the Cyber Deception, Building the Scientific Foundation, 2016

2015
Cyber-Deception and Attribution in Capture-the-Flag Exercises.
Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2015

Malware Task Identification: A Data Driven Approach.
Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2015


  Loading...